Sciweavers

282 search results - page 26 / 57
» Private Policy Negotiation
Sort
View
HOTOS
2003
IEEE
14 years 21 days ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
14 years 1 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
PET
2007
Springer
14 years 1 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...
ICDE
2006
IEEE
113views Database» more  ICDE 2006»
14 years 1 months ago
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider o...
Vikram Goyal, Shyam K. Gupta, Indira Meshram, Anan...
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
13 years 11 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson